Debian Package Tracker
Register | Log in
Subscribe

firefox-esr

Mozilla Firefox web browser - Extended Support Release (ESR)

Choose email to subscribe with

general
  • source: firefox-esr (main)
  • version: 128.12.0esr-1
  • maintainer: Maintainers of Mozilla-related packages (DMD)
  • uploaders: Mike Hommey [DMD]
  • arch: all any
  • std-ver: 3.9.8.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 115.14.0esr-1~deb11u1
  • old-sec: 128.12.0esr-1~deb11u1
  • old-p-u: 115.14.0esr-1~deb11u1
  • stable: 128.10.0esr-1~deb12u1
  • stable-sec: 128.12.0esr-1~deb12u1
  • stable-p-u: 128.12.0esr-1~deb12u1
  • testing: 128.11.0esr-1
  • unstable: 128.12.0esr-1
versioned links
  • 78.15.0esr-1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 91.13.0esr-1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 115.14.0esr-1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 115.15.0esr-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 128.10.0esr-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 128.11.0esr-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 128.12.0esr-1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 128.12.0esr-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 128.12.0esr-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • firefox-esr (261 bugs: 5, 225, 31, 0)
  • firefox-esr-l10n-ach
  • firefox-esr-l10n-af
  • firefox-esr-l10n-all
  • firefox-esr-l10n-an
  • firefox-esr-l10n-ar
  • firefox-esr-l10n-ast
  • firefox-esr-l10n-az
  • firefox-esr-l10n-be
  • firefox-esr-l10n-bg
  • firefox-esr-l10n-bn
  • firefox-esr-l10n-br
  • firefox-esr-l10n-bs
  • firefox-esr-l10n-ca
  • firefox-esr-l10n-ca-valencia
  • firefox-esr-l10n-cak
  • firefox-esr-l10n-cs
  • firefox-esr-l10n-cy
  • firefox-esr-l10n-da
  • firefox-esr-l10n-de (1 bugs: 0, 1, 0, 0)
  • firefox-esr-l10n-dsb
  • firefox-esr-l10n-el (1 bugs: 0, 1, 0, 0)
  • firefox-esr-l10n-en-ca (1 bugs: 0, 1, 0, 0)
  • firefox-esr-l10n-en-gb (1 bugs: 0, 1, 0, 0)
  • firefox-esr-l10n-eo
  • firefox-esr-l10n-es-ar
  • firefox-esr-l10n-es-cl
  • firefox-esr-l10n-es-es
  • firefox-esr-l10n-es-mx
  • firefox-esr-l10n-et
  • firefox-esr-l10n-eu
  • firefox-esr-l10n-fa
  • firefox-esr-l10n-ff
  • firefox-esr-l10n-fi (1 bugs: 0, 1, 0, 0)
  • firefox-esr-l10n-fr
  • firefox-esr-l10n-fur
  • firefox-esr-l10n-fy-nl
  • firefox-esr-l10n-ga-ie
  • firefox-esr-l10n-gd
  • firefox-esr-l10n-gl
  • firefox-esr-l10n-gn
  • firefox-esr-l10n-gu-in
  • firefox-esr-l10n-he
  • firefox-esr-l10n-hi-in
  • firefox-esr-l10n-hr
  • firefox-esr-l10n-hsb
  • firefox-esr-l10n-hu
  • firefox-esr-l10n-hy-am
  • firefox-esr-l10n-ia
  • firefox-esr-l10n-id
  • firefox-esr-l10n-is
  • firefox-esr-l10n-it
  • firefox-esr-l10n-ja
  • firefox-esr-l10n-ka
  • firefox-esr-l10n-kab
  • firefox-esr-l10n-kk
  • firefox-esr-l10n-km
  • firefox-esr-l10n-kn
  • firefox-esr-l10n-ko
  • firefox-esr-l10n-lij
  • firefox-esr-l10n-lt
  • firefox-esr-l10n-lv
  • firefox-esr-l10n-mk
  • firefox-esr-l10n-mr
  • firefox-esr-l10n-ms
  • firefox-esr-l10n-my
  • firefox-esr-l10n-nb-no
  • firefox-esr-l10n-ne-np
  • firefox-esr-l10n-nl
  • firefox-esr-l10n-nn-no
  • firefox-esr-l10n-oc
  • firefox-esr-l10n-pa-in
  • firefox-esr-l10n-pl
  • firefox-esr-l10n-pt-br
  • firefox-esr-l10n-pt-pt
  • firefox-esr-l10n-rm
  • firefox-esr-l10n-ro
  • firefox-esr-l10n-ru
  • firefox-esr-l10n-sat
  • firefox-esr-l10n-sc
  • firefox-esr-l10n-sco
  • firefox-esr-l10n-si
  • firefox-esr-l10n-sk
  • firefox-esr-l10n-skr
  • firefox-esr-l10n-sl
  • firefox-esr-l10n-son
  • firefox-esr-l10n-sq
  • firefox-esr-l10n-sr
  • firefox-esr-l10n-sv-se
  • firefox-esr-l10n-szl
  • firefox-esr-l10n-ta
  • firefox-esr-l10n-te
  • firefox-esr-l10n-tg
  • firefox-esr-l10n-th
  • firefox-esr-l10n-tl
  • firefox-esr-l10n-tr
  • firefox-esr-l10n-trs
  • firefox-esr-l10n-uk
  • firefox-esr-l10n-ur
  • firefox-esr-l10n-uz
  • firefox-esr-l10n-vi
  • firefox-esr-l10n-xh
  • firefox-esr-l10n-zh-cn
  • firefox-esr-l10n-zh-tw
action needed
A new upstream version is available: 140.1.0esr high
A new upstream version 140.1.0esr is available, you should consider packaging it.
Created: 2025-06-25 Last update: 2025-07-23 09:30
9 security issues in trixie high

There are 9 open security issues in trixie.

9 important issues:
  • CVE-2025-8027: On 64-bit platforms IonMonkey-JIT only wrote 32 bits of the 64-bit return value space on the stack. Baseline-JIT, however, read the entire 64 bits. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8028: On arm64, a WASM `br_table` instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8029: Thunderbird executed `javascript:` URLs when used in `object` and `embed` tags. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8030: Insufficient escaping in the “Copy as cURL” feature could potentially be used to trick a user into executing unexpected code. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8031: The `username:password` part was not correctly stripped from URLs in CSP reports potentially leaking HTTP Basic Authentication credentials. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8032: XSLT document loading did not correctly propagate the source document which bypassed its CSP. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8033: The JavaScript engine did not handle closed generators correctly and it was possible to resume them leading to a nullptr deref. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8034: Memory safety bugs present in Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8035: Memory safety bugs present in Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
Created: 2025-07-23 Last update: 2025-07-23 06:31
9 security issues in sid high

There are 9 open security issues in sid.

9 important issues:
  • CVE-2025-8027: On 64-bit platforms IonMonkey-JIT only wrote 32 bits of the 64-bit return value space on the stack. Baseline-JIT, however, read the entire 64 bits. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8028: On arm64, a WASM `br_table` instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8029: Thunderbird executed `javascript:` URLs when used in `object` and `embed` tags. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8030: Insufficient escaping in the “Copy as cURL” feature could potentially be used to trick a user into executing unexpected code. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8031: The `username:password` part was not correctly stripped from URLs in CSP reports potentially leaking HTTP Basic Authentication credentials. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8032: XSLT document loading did not correctly propagate the source document which bypassed its CSP. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8033: The JavaScript engine did not handle closed generators correctly and it was possible to resume them leading to a nullptr deref. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8034: Memory safety bugs present in Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8035: Memory safety bugs present in Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
Created: 2025-07-23 Last update: 2025-07-23 06:31
9 security issues in bullseye high

There are 9 open security issues in bullseye.

9 important issues:
  • CVE-2025-8027: On 64-bit platforms IonMonkey-JIT only wrote 32 bits of the 64-bit return value space on the stack. Baseline-JIT, however, read the entire 64 bits. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8028: On arm64, a WASM `br_table` instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8029: Thunderbird executed `javascript:` URLs when used in `object` and `embed` tags. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8030: Insufficient escaping in the “Copy as cURL” feature could potentially be used to trick a user into executing unexpected code. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8031: The `username:password` part was not correctly stripped from URLs in CSP reports potentially leaking HTTP Basic Authentication credentials. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8032: XSLT document loading did not correctly propagate the source document which bypassed its CSP. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8033: The JavaScript engine did not handle closed generators correctly and it was possible to resume them leading to a nullptr deref. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8034: Memory safety bugs present in Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8035: Memory safety bugs present in Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
Created: 2025-07-23 Last update: 2025-07-23 06:31
9 security issues in bookworm high

There are 9 open security issues in bookworm.

9 important issues:
  • CVE-2025-8027: On 64-bit platforms IonMonkey-JIT only wrote 32 bits of the 64-bit return value space on the stack. Baseline-JIT, however, read the entire 64 bits. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8028: On arm64, a WASM `br_table` instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8029: Thunderbird executed `javascript:` URLs when used in `object` and `embed` tags. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8030: Insufficient escaping in the “Copy as cURL” feature could potentially be used to trick a user into executing unexpected code. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8031: The `username:password` part was not correctly stripped from URLs in CSP reports potentially leaking HTTP Basic Authentication credentials. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8032: XSLT document loading did not correctly propagate the source document which bypassed its CSP. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8033: The JavaScript engine did not handle closed generators correctly and it was possible to resume them leading to a nullptr deref. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8034: Memory safety bugs present in Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
  • CVE-2025-8035: Memory safety bugs present in Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
Created: 2025-07-23 Last update: 2025-07-23 06:31
lintian reports 5 errors and 5 warnings high
Lintian reports 5 errors and 5 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-05-18 Last update: 2025-06-25 21:03
Standards version of the package is outdated. high
The package is severely out of date with respect to the Debian Policy. The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 3.9.8.0).
Created: 2017-06-24 Last update: 2025-06-25 11:23
15 bugs tagged patch in the BTS normal
The BTS contains patches fixing 15 bugs (16 if counting merged bugs), consider including or untagging them.
Created: 2025-01-06 Last update: 2025-07-23 08:30
Depends on packages which need a new maintainer normal
The packages that firefox-esr depends on which need a new maintainer are:
  • hunspell-kk (#879871)
    • Recommends: hunspell-kk
  • ifrench-gut (#1006643)
    • Recommends: myspell-fr-gut
  • uzbek-wordlist (#841696)
    • Recommends: hunspell-uz
Created: 2019-11-22 Last update: 2025-07-23 08:00
version in VCS is newer than in repository, is it time to upload? normal
vcswatch reports that this package seems to have a new changelog entry (version 128.13.0esr-1, distribution unstable) and new commits in its VCS. You should consider whether it's time to make an upload.
Created: 2025-07-23 Last update: 2025-07-23 03:02
AppStream hints: 1 warning for firefox-esr normal
AppStream found metadata issues for packages:
  • firefox-esr: 1 warning
You should get rid of them to provide more metadata about this software.
Created: 2020-01-13 Last update: 2025-04-02 15:31
debian/patches: 20 patches to forward upstream low

Among the 20 debian patches available in version 128.12.0esr-1 of the package, we noticed the following issues:

  • 20 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-06-25 14:00
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2024-07-24 Last update: 2024-12-11 13:32
testing migrations
  • This package will soon be part of the auto-libvpx transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2025-07-23] firefox-esr 128.12.0esr-1 MIGRATED to testing (Debian testing watch)
  • [2025-07-23] Accepted firefox-esr 128.13.0esr-1 (source) into unstable (Mike Hommey)
  • [2025-06-26] Accepted firefox-esr 128.12.0esr-1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-06-25] Accepted firefox-esr 128.12.0esr-1~deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-06-25] Accepted firefox-esr 128.12.0esr-1~deb11u1 (source) into oldstable-security (Emilio Pozuelo Monfort)
  • [2025-06-25] Accepted firefox-esr 128.12.0esr-1 (source) into unstable (Mike Hommey)
  • [2025-05-30] Accepted firefox-esr 128.11.0esr-1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-05-30] firefox-esr 128.11.0esr-1 MIGRATED to testing (Debian testing watch)
  • [2025-05-29] Accepted firefox-esr 128.11.0esr-1~deb11u1 (source) into oldstable-security (Emilio Pozuelo Monfort)
  • [2025-05-28] Accepted firefox-esr 128.11.0esr-1~deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-05-28] Accepted firefox-esr 128.11.0esr-1 (source) into unstable (Mike Hommey)
  • [2025-05-20] firefox-esr 128.10.1esr-1 MIGRATED to testing (Debian testing watch)
  • [2025-05-19] Accepted firefox-esr 128.10.1esr-1~deb11u1 (source) into oldstable-security (Emilio Pozuelo Monfort)
  • [2025-05-18] Accepted firefox-esr 128.10.1esr-1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-05-18] Accepted firefox-esr 128.10.1esr-1~deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-05-17] Accepted firefox-esr 128.10.1esr-1 (source) into unstable (Mike Hommey)
  • [2025-05-10] firefox-esr 128.10.0esr-1 MIGRATED to testing (Debian testing watch)
  • [2025-05-03] Accepted firefox-esr 128.10.0esr-1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-04-30] Accepted firefox-esr 128.10.0esr-1~deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-04-30] Accepted firefox-esr 128.10.0esr-1 (source) into unstable (Mike Hommey)
  • [2025-04-07] firefox-esr 128.9.0esr-2 MIGRATED to testing (Debian testing watch)
  • [2025-04-05] Accepted firefox-esr 128.9.0esr-1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-04-02] Accepted firefox-esr 128.9.0esr-1~deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-04-02] Accepted firefox-esr 128.9.0esr-1~deb11u1 (source) into oldstable-security (Emilio Pozuelo Monfort)
  • [2025-04-02] Accepted firefox-esr 128.9.0esr-2 (source) into unstable (Mike Hommey)
  • [2025-04-02] Accepted firefox-esr 128.9.0esr-1 (source) into unstable (Mike Hommey)
  • [2025-03-10] firefox-esr 128.8.0esr-1 MIGRATED to testing (Debian testing watch)
  • [2025-03-09] Accepted firefox-esr 128.8.0esr-1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Mike Hommey)
  • [2025-03-06] Accepted firefox-esr 128.8.0esr-1~deb11u1 (source) into oldstable-security (Emilio Pozuelo Monfort)
  • [2025-03-05] Accepted firefox-esr 128.8.0esr-1~deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Mike Hommey)
  • 1
  • 2
bugs [bug history graph]
  • all: 276 281
  • RC: 6
  • I&N: 235 240
  • M&W: 35
  • F&P: 0
  • patch: 15 16
  • NC: 1
links
  • lintian (5, 5)
  • buildd: logs, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing